Darknet Diarieshttps://darknetdiaries.com/
en-usJack RhysiderTrue stories from the dark side of the Internet.Jack RhysiderDarknet Diaries explores true stories from the dark side of the Internet. Stories about hackers, infosec, online security, and the Internet.infosec,security,hacking,privacy,Internet,hackers,breaches,threats,security,malware,trojan,virus,crypto,phreaker,hacktivism,true,crime,cyberExplore the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of privacy hacks, data breaches, and cyber crime. The masterful criminal hackers who dwell on the dark side show us just how vulnerable we all are.yeshttps://darknetdiaries.com/podcast.xmlJack Rhysiderinfosec,security,hacking,privacy,Internet,hackers,breaches,threats,security,malware,trojan,virus,crypto,phreaker,hacktivism,true,crime,cyberTechnology/Tech NewsSociety & Culture/Historyjack@darknetdiaries.comEp 14: #OpJustina#OpJustinaJack RhysiderIn 2013 a hospital was accused of conducting a medical kidnapping against a young girl name Justina. This enraged many people across the country, including members of anonymous. A DDOS attack was waged against the hospital.33:56114fullhttps://darknetdiaries.com/podcasts/darknet-diaries-ep14-opjustina.mp3Thu, 01 Mar 2018 00:00:00 -0800yesjack@darknetdiaries.cominfosec,security,hacking,privacy,Internet,hackers,breaches,threats,security,malware,trojan,virus,crypto,phreaker,hacktivism,true,crime,cyberEp 13: Carna BotnetCarna BotnetJack RhysiderIn 2012 the Carna Bot was built and unleashed on the world. But it didn't have any intentions on doing anything malicious. It was built just to help us all understand the Internet better. This botnet used the oldest security vulnerable in the book. And the data that came out of it was amazing.33:18113fullhttps://darknetdiaries.com/podcasts/darknet-diaries-ep13-carna.mp3Thu, 15 Feb 2018 00:00:00 -0800yesjack@darknetdiaries.cominfosec,security,hacking,privacy,Internet,hackers,breaches,threats,security,malware,trojan,virus,crypto,phreaker,hacktivism,true,crime,cyberEp 12: Crypto WarsCrypto WarsJack RhysiderIn the 1990's the Internet started to take shape. But the US goverment had strict laws regulating what type of cryptography is allowed to be used online. A few brave people stood up to the government in the name of civil rights and won the right to use strong encryption. Listen to their battle and what they had to do through to accomplish this.28:31112fullhttps://darknetdiaries.com/podcasts/darknet-diaries-ep12-cryptowars.mp3Thu, 01 Feb 2018 00:00:00 -0800yesjack@darknetdiaries.cominfosec,security,hacking,privacy,Internet,hackers,breaches,threats,security,malware,trojan,virus,crypto,phreaker,hacktivism,true,crime,cyberEp 11: Strictly ConfidentialStrictly ConfidentialJack RhysiderWhat happens when an innovative tech company, that's trying to develop the next big thing, detects a hacker in their network? We hear the story from a digital forensics investigator which has a surprising result.20:08111fullhttps://darknetdiaries.com/podcasts/darknet-diaries-ep11-buyout.mp3Mon, 15 Jan 2018 00:00:00 -0800yesjack@darknetdiaries.cominfosec,security,hacking,privacy,Internet,hackers,breaches,threats,security,malware,trojan,virus,crypto,phreaker,hacktivism,true,crime,cyberEp 10: Misadventures of a Nation State ActorMisadventures of a Nation State ActorJack RhysiderIn today's world of intelligence gathering, governments hack other governments. This episode takes you on a ride with a nation state actor to see exactly how it's done.34:01110fullhttps://darknetdiaries.com/podcasts/darknet-diaries-ep10-wiretap-mishap.mp3Mon, 01 Jan 2018 00:00:00 -0800yesjack@darknetdiaries.cominfosec,security,hacking,privacy,Internet,hackers,breaches,threats,security,malware,trojan,virus,crypto,phreaker,hacktivism,true,crime,cyberEp 9: The Rise and Fall of Mt. GoxThe Rise and Fall of Mt. GoxJack RhysiderMt. Gox was the largest bitcoin exchange in the world. It suddenly went offline. What happened?29:2519fullhttps://darknetdiaries.com/podcasts/darknet-diaries-ep9-mtgox.mp3Fri, 15 Dec 2017 00:00:00 -0800yesjack@darknetdiaries.cominfosec,security,hacking,privacy,Internet,hackers,breaches,threats,security,malware,trojan,virus,crypto,phreaker,hacktivism,true,crime,cyberEp 8: Manfred Part 2: Hacking Online Video Games for ProfitManfred Part 2: Hacking Online Video Games for ProfitJack RhysiderManfred found a way to turn his passion for video games and reverse engineering into a full time business. He exploited video games and sold virtual goods and currency for real money. This was his full time job. Listen to this episode to hear exactly how he did this. 28:0718fullhttps://darknetdiaries.com/podcasts/darknet-diaries-ep8-manfred-part2.mp3Fri, 01 Dec 2017 00:01:00 -0800yesjack@darknetdiaries.cominfosec,security,hacking,privacy,Internet,hackers,breaches,threats,security,malware,trojan,virus,crypto,phreaker,hacktivism,true,crime,cyberEp 7: Manfred Part 1: Hacking Online Video Games for FunManfred Part 1: Hacking Online Video Games for FunJack RhysiderManfred has had the most epic story of all online video game stories. For the last 20 years, he's been hacking online games.23:1617fullhttps://darknetdiaries.com/podcasts/darknet-diaries-ep7-manfred-part1.mp3Fri, 01 Dec 2017 00:00:00 -0800yesjack@darknetdiaries.cominfosec,security,hacking,privacy,Internet,hackers,breaches,threats,security,malware,trojan,virus,crypto,phreaker,hacktivism,true,crime,cyberEp 6: The Beirut Bank JobThe Beirut Bank JobJack RhysiderJayson E. Street tells us a story about the time he broke into a bank in Beirut Lebanon.29:1916fullhttps://darknetdiaries.com/podcasts/darknet-diaries-ep6-jaysonstreet.mp3Wed, 15 Nov 2017 00:00:00 -0800yesjack@darknetdiaries.cominfosec,security,hacking,privacy,Internet,hackers,breaches,threats,security,malware,trojan,virus,crypto,phreaker,hacktivism,true,crime,cyberEp 5: #ASUSGATE#ASUSGATEJack RhysiderSecurity researcher Kyle Lovett bought a new Asus router in 2013. He found it was riddled with security vulnerabilties. He set out on a mission to resolve these vulnerabilities not only for his own router, but for thousands of others who were also vulnerable. 24:5815fullhttps://darknetdiaries.com/podcasts/darknet-diaries-ep5-asus.mp3Wed, 01 Nov 2017 02:00:00 -0700yesjack@darknetdiaries.cominfosec,security,hacking,privacy,Internet,hackers,breaches,threats,security,malware,trojan,virus,crypto,phreaker,hacktivism,true,crime,cyberEp 4: Panic! at the TalkTalk Board RoomPanic! at the TalkTalk Board RoomJack RhysiderMobile provider TalkTalk suffered a major breach in 2015. The CEO tried her best to keep angry customers calm and carry on. The UK government and Metropolitan Police investigate the breach. We get a rare glimpse of how the CEO handles the crisis.38:2314fullhttps://darknetdiaries.com/podcasts/darknet-diaries-ep4-talktalk.mp3Sun, 15 Oct 2017 05:00:00 -0700yesjack@darknetdiaries.cominfosec,security,hacking,privacy,Internet,hackers,breaches,threats,security,malware,trojan,virus,crypto,phreaker,hacktivism,true,crime,cyberEp 3: DigiNotar, You are the Weakest Link, Good Bye!DigiNotar, You are the Weakest Link, Good Bye!Jack RhysiderThe 2011 DigiNotar breach changed the way browsers do security. In this episode, we learn what role a CA plays, how browsers work with CAs, and what happens when a CA is breached.25:1513fullhttps://darknetdiaries.com/podcasts/darknet-diaries-ep3-diginotar.mp3Sun, 01 Oct 2017 05:00:00 -0700yesjack@darknetdiaries.cominfosec,security,hacking,privacy,Internet,hackers,breaches,threats,security,malware,trojan,virus,crypto,phreaker,hacktivism,true,crime,cyberEp 2: The Peculiar Case of the VTech HackerThe Peculiar Case of the VTech HackerJack RhysiderVTech makes toy tablets, laptops, and watches for kids. In 2015, they were breached. The hacker downloaded gigs of children's data. Discover what the hacker did once he took the data.23:0312fullhttps://darknetdiaries.com/podcasts/darknet-diaries-ep2-vtech.mp3Fri, 15 Sep 2017 05:00:00 -0700yesjack@darknetdiaries.cominfosec,security,hacking,privacy,Internet,hackers,breaches,threats,security,malware,trojan,virus,crypto,phreaker,hacktivism,true,crime,cyberEp 1: The Phreaky World of PBX HackingThe Phreaky World of PBX HackingJack RhysiderFarhan Arshad and Noor Aziz Uddin were captured 2 years after being placed on the FBI's Cyber's Most Wanted list for PBX hacking. In this episode, we explain PBX hacking and how hackers are racking up billions of dollars in phone bills. We also learn how the two men were captured.14:0111fullhttps://darknetdiaries.com/podcasts/darknet-diaries-ep1-pbx-hacking.mp3Fri, 01 Sep 2017 05:00:00 -0700yesjack@darknetdiaries.cominfosec,security,hacking,privacy,Internet,hackers,breaches,threats,security,malware,trojan,virus,crypto,phreaker,hacktivism,true,crime,cyberJack RhysideradultTrue stories from the dark side of the Internet.